Description
The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack, a different issue than CVE-2012-4929.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
F5
Subscribe
Arx
Subscribe
Big-ip Access Policy Manager
Subscribe
Big-ip Advanced Firewall Manager
Subscribe
Big-ip Analytics
Subscribe
Big-ip Application Acceleration Manager
Subscribe
Big-ip Application Security Manager
Subscribe
Big-ip Edge Gateway
Subscribe
Big-ip Link Controller
Subscribe
Big-ip Local Traffic Manager
Subscribe
Big-ip Policy Enforcement Manager
Subscribe
Big-ip Protocol Security Module
Subscribe
Big-ip Wan Optimization Manager
Subscribe
Big-ip Webaccelerator
Subscribe
Firepass
Subscribe
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T16:14:56.365Z
Reserved: 2013-05-21T00:00:00.000Z
Link: CVE-2013-3587
No data.
Status : Modified
Published: 2020-02-21T18:15:11.427
Modified: 2024-11-21T01:53:56.283
Link: CVE-2013-3587
OpenCVE Enrichment
No data.
Weaknesses